DOMESTIC INTRUDER SYSTEM
Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 4
Abstract
Throughout history, humans have sought to protect their life, property and possessions. In early societies, guards, watchdogs, traps and even noisemakers provided security. Fire was used to baffle wild animals and keep them at bay. As centuries passed and human accomplishments became more noteworthy, some rather engaging and sophisticated devices were developed to insure man's security. But until the discovery and harnessing of electricity, no device or protection scheme could be expected to provide any real degree of assurance or consistent peace of mind. Now when everything is available to us why not design something that provide us complete security .The very basic of this started with the simple alarm system and today it include capturing image , notifying suspicious activities etc.Commercially available Security systems are too expensive to be used by common population. We are trying to present a security system that provides all the facilities needed for security like activation of an alarm, capturing an image of intruder, along with sms and email notification at a very low cost.
Authors and Affiliations
B. Persis Urbana Ivy , G. Gaurav Modi
IDENTIFYING NETWORK LOAD BALANCING REQUIREMENTS ON HISTORICAL TRAFFIC FLOW USING MACHINE LEARNING APPROACH FOR FLEXIBLE MULTIPATH NETWORKS
Multipath routing uses several paths to distribute traffic from a source to destination. This not only improves network performance but also achieves load balancing and fault tolerance. Though multipath routing is not de...
OPTIMIZED FLAME DETECTION USING IMAGE PROCESSING BASED TECHNIQUES
Present work is an in depth study to detect flames in video by processing the data captured by an ordinary camera. Previous vision based methods were based on color difference, motion detection of flame pixel and flame e...
PERFORMANCE EVALUATION OF DIFFERENT LINE CODES
The ability to communicate has differentiated mankind from other species. 20lh century has seen considerable emphasis on development of efficient communication techniques because how well one is able to communicate has b...
SURVEY SOME ATTACKS ON CLIENT SIDE, BROWSER & CLOUD
Cloud computing is not a new name in the technology world but there are many new issues arises related with cloud. Every time in consumer mind a fear rotates because he is aware from vulnerabilities related with cloud. S...
Comparative study of security parameters by Cloud Providers
Security is one of the major issues today around the world. Either it is a home user or Corporate User, a small PC or a Server System, nothing is totally secure, lots of issues have been raised regarding security. In thi...